A friend of mine recently took to social media to complain about his bank website’s newly-implemented two-factor authentication system. And I have to agree – having to enter your account credentials plus receive a phone call or text and enter a 6-digit code on my device is just not a great user experience. But as […]

An ongoing debate rages around which sales methodology is the most effective. Within that debate, one of the trending topics has been the rise of the Challenger Sales methodology, based on Matthew Dixon and Brent Adamson’s popular 2011 book The Challenger Sale: Taking Control of the Customer Conversation. What exactly is Challenger– and why is […]

In the 16 months since it was announced, Windows Autopilot has revolutionized the way Windows devices are configured and deployed. Leveraging Microsoft’s cloud technology, Autopilot allows you to set up and pre-configure new Windows 10 devices while eliminating the cost and complexity associated with mass deployments. Prior to Autopilot, the standard procedure for such deployments involved building […]

Hackers will go to surprising lengths to infiltrate an organization’s network, typically using threat vectors such as email attachments, websites, and USB removable media as a starting point. Once your account credentials or machine has been compromised, an attacker will typically install a remote trojan or backdoor on your system that allows the attacker to […]

Free Tools! In my last post I touched on getting to the cloud, which can be a challenge if you’re not using the right tools. Metalogix, Sharegate, and AvePoint are all recommended solutions, and you won’t go wrong using any of these. But for now, I’ll leave their pros and cons for a future post. […]

In the spirit of the Fourth of July, I wanted to take a little bit of time to talk about freeing yourself from the system administration and high overhead costs that come with hosting your own server hardware and infrastructure. Ever since the creation of the first websites and database applications, the same conversations have […]

In our business, Olive + Goose works with many industries subject to stringent security requirements, including health care, pharmaceuticals, and defense. Unfortunately, many customers only come to us for help AFTER they have had a security breach. One common scenario that we see involves a phishing attack allowing a bad actor access to a compromised […]

To the Cloud! Sounds simple, doesn’t it? Set up a Microsoft Office 365 tenant, spin up a few SharePoint Online sites for your teams, and you’re off! In a perfect IT world, this kind of fresh start seems like the easiest way to go. But then, well…reality hits. You have an on-premises farm with years […]

70% of firms say that they are NOT ready for GDPR1. Enforcement of the new General Data Protection Regulation (GDPR) goes into effect today i.e. May 25, 2018, and we wanted to ensure that you were aware of what the regulation is and that you’re ready. The GDPR sets a new and higher bar for […]

Are you interested in knowing how to manage devices and apps both on-premises and in the cloud, all from a single management console? Is keeping corporate information secure your organization’s top priority but is a growing challenge every day? You can learn about all of this and more by joining our consultant Riaz Javed for […]